Movatterモバイル変換


[0]ホーム

URL:


US9985938B2 - User control over WIFI network access - Google Patents

User control over WIFI network access
Download PDF

Info

Publication number
US9985938B2
US9985938B2US15/131,889US201615131889AUS9985938B2US 9985938 B2US9985938 B2US 9985938B2US 201615131889 AUS201615131889 AUS 201615131889AUS 9985938 B2US9985938 B2US 9985938B2
Authority
US
United States
Prior art keywords
user
communication device
access systems
wifi access
wifi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US15/131,889
Other versions
US20160234179A1 (en
Inventor
John M. Gatewood
Lee Alan Schnitzer
Sharon L. Woodrum
Bhanu Prakash Voruganti
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
T Mobile Innovations LLC
Original Assignee
Sprint Communications Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sprint Communications Co LPfiledCriticalSprint Communications Co LP
Assigned to SPRINT COMMUNICATIONS COMPANY L.P.reassignmentSPRINT COMMUNICATIONS COMPANY L.P.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GATEWOOD, John M., SCHNITZER, Lee Alan, VORUGANTI, Bhanu Prakash, WOODRUM, SHARON L.
Priority to US15/131,889priorityCriticalpatent/US9985938B2/en
Publication of US20160234179A1publicationCriticalpatent/US20160234179A1/en
Assigned to DEUTSCHE BANK TRUST COMPANY AMERICASreassignmentDEUTSCHE BANK TRUST COMPANY AMERICASGRANT OF FIRST PRIORITY AND JUNIOR PRIORITY SECURITY INTEREST IN PATENT RIGHTSAssignors: SPRINT COMMUNICATIONS COMPANY L.P.
Publication of US9985938B2publicationCriticalpatent/US9985938B2/en
Application grantedgrantedCritical
Assigned to DEUTSCHE BANK TRUST COMPANY AMERICASreassignmentDEUTSCHE BANK TRUST COMPANY AMERICASSECURITY AGREEMENTAssignors: ASSURANCE WIRELESS USA, L.P., BOOST WORLDWIDE, LLC, CLEARWIRE COMMUNICATIONS LLC, CLEARWIRE IP HOLDINGS LLC, CLEARWIRE LEGACY LLC, ISBV LLC, Layer3 TV, Inc., PushSpring, Inc., SPRINT COMMUNICATIONS COMPANY L.P., SPRINT INTERNATIONAL INCORPORATED, SPRINT SPECTRUM L.P., T-MOBILE CENTRAL LLC, T-MOBILE USA, INC.
Assigned to SPRINT COMMUNICATIONS COMPANY L.P.reassignmentSPRINT COMMUNICATIONS COMPANY L.P.TERMINATION AND RELEASE OF FIRST PRIORITY AND JUNIOR PRIORITY SECURITY INTEREST IN PATENT RIGHTSAssignors: DEUTSCHE BANK TRUST COMPANY AMERICAS
Assigned to T-MOBILE INNOVATIONS LLCreassignmentT-MOBILE INNOVATIONS LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SPRINT COMMUNICATIONS COMPANY L.P.
Assigned to T-MOBILE USA, INC., SPRINT INTERNATIONAL INCORPORATED, T-MOBILE CENTRAL LLC, IBSV LLC, LAYER3 TV, LLC, CLEARWIRE COMMUNICATIONS LLC, PUSHSPRING, LLC, BOOST WORLDWIDE, LLC, ASSURANCE WIRELESS USA, L.P., CLEARWIRE IP HOLDINGS LLC, SPRINT SPECTRUM LLC, SPRINTCOM LLC, SPRINT COMMUNICATIONS COMPANY L.P.reassignmentT-MOBILE USA, INC.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: DEUTSCHE BANK TRUST COMPANY AMERICAS
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A wireless communication device controls access to a geographically-distributed Wireless Fidelity (WiFi) network. The wireless communication device graphically presents WiFi network data to receive user selections of multiple WiFi access systems, a network name, and a user password. The wireless communication device receives configuration data that associates broadcast identification signals for the WiFi access systems with the network name. The wireless communication device detects a broadcast identification signal for one of the WiFi access systems and responsively presents the network name and a password prompt to receive the user password. The wireless communication device transfers the network name and the user password to the WiFi access system, and in response, the wireless communication device exchanges user data over the WiFi access system.

Description

RELATED CASES
This patent application is a continuation of U.S. patent application Ser. No. 13/552,749 that was filed on Jul. 19, 2012 and is entitled “USER CONTROL OVER WIFI NETWORK ACCESS.” U.S. patent application Ser. No. 13/552,749 is hereby incorporated by reference into this patent application.
TECHNICAL BACKGROUND
Wireless Fidelity (WiFi) is a popular wireless protocol to obtain network access—often to the Internet. Typically, a WiFi access point broadcasts a Service Set Identification (SSID) that is detected by user devices. The user devices typically respond to the SSID with an access code that is pre-stored in the WiFi access point. The WiFi access point provides network access if the user-provided access code matches the pre-stored access code. The user typically manages multiple access codes for the various WiFi access points that they use. Unfortunately, these WiFi access points are not used to provide effective and efficient user control over WiFi network access.
Other wireless networks also include user authorization systems that control network access. For example, 3G networks may have an Authentication, Authorization, and Accounting (AAA) system, and 4G networks may have a Home Subscriber Server (HSS). These other wireless networks also provide network access to user devices. Unfortunately, the other wireless networks are not used to provide effective and efficient user control over WiFi network access.
In particular, WiFi access points and these other wireless networks are not effectively used in an integrated manner to provide efficient user control over WiFi network access.
Technical Overview
A wireless communication device controls access to a geographically-distributed Wireless Fidelity (WiFi) network. The wireless communication device graphically presents WiFi network data to receive user selections of multiple WiFi access systems, a network name, and a user password. The wireless communication device receives configuration data that associates broadcast identification signals for the WiFi access systems with the network name. The wireless communication device detects a broadcast identification signal for one of the WiFi access systems and responsively presents the network name and a password prompt to receive the user password. The wireless communication device transfers the network name and the user password to the WiFi access system, and in response, the wireless communication device exchanges user data over the WiFi access system.
DESCRIPTION OF THE DRAWINGS
FIG. 1 illustrates a communication system to provide user control over access to a WiFi network having geographically-distributed WiFi access systems.
FIG. 2 illustrates the operation of a communication system to provide user control over access to a WiFi network having geographically-distributed WiFi access systems.
FIG. 3 illustrates the operation of a communication system to provide user control over access to a WiFi network having geographically-distributed WiFi access systems by allowing user-selection of communication devices.
FIG. 4 illustrates the operation of a communication system to provide user control over access to a WiFi network having geographically-distributed WiFi access systems by transferring configuration data to a user communication device.
FIG. 5 illustrates the operation of a communication system to provide user control over access to a WiFi network having geographically-distributed WiFi access systems by using dynamic access keys.
FIG. 6 illustrates a communication device display that renders a geographic map for a user to select WiFi network access systems and specify passwords.
FIG. 7 illustrates a wireless Long Term Evolution (LTE) network to provide user control over access to a WiFi network having geographically-distributed WiFi access systems.
FIG. 8 illustrates an WiFi system to provide user control over access to a WiFi network having geographically-distributed WiFi access systems.
FIG. 9 illustrates a server system to provide user control over access to WiFi networks.
FIG. 10 illustrates wireless communication device to provide user control over access to WiFi networks.
DETAILED DESCRIPTION
FIG. 1 illustratescommunication system100 to provide user control over access toWiFi network120 having geographically-distributed WiFi access systems121-124.Communication system100 comprises user communication devices101-103,access network110,WiFi network120, andserver system130.Server system130 comprisesuser interface server131 andauthorization server132.
User communication devices101-103 comprise phones, computers, media players, machine transceivers, or some other WiFi communication equipment. User communication devices101-102 andaccess network110 communicate over respective access links111-112. User communication devices101-103 and WiFi access systems121-123 communicate over respective WiFi links113-115.Access network110 andWiFi network120 communicate withserver system130 over respective network links116-117.
In operation,user interface server131 transfers display data touser communication device101 overaccess network110 andlinks111 and116 for presentation to a user. In response to the display data, the user selects WiFi access systems121-123 but not accesssystem124. The user also selects a single password for the user-selected WiFi access systems121-123. In some examples, the display data renders geographic maps that indicate WiFi access systems121-124 for selection. The display data may also include a data collection module to collect the password from the user.
User communication device101 transfers user data for delivery touser interface server131. The user data indicates the user-selected WiFi network access systems121-123, the user-selected password, and possibly other user selections and data.User interface server131 receives and transfers the user data touser authorization server132.
Authorization server132 stores an association between the user-selected WiFi network access systems121-123 and the user-selected password. Subsequently,user communication device101 moves nearWiFi access system121 and transfers an access request toWiFi access system121 using the user-selected password.WiFi access system121 transfers the access request for delivery toauthorization server132.
Authorization server132 receives the access request for access to user-selected WiFinetwork access system121 using the user-selected password. Based on the stored association between the user-selected WiFinetwork access system121 and the user-selected password,authorization server132 transfers a positive response for delivery to WiFinetwork access system121. WiFinetwork access system121 then provides WiFi access (typically to the Internet) towireless communication device101 overWiFi link113.
User wireless communication device102 could select and use multiple WiFi access systems with a single password in a similar manner. In some examples,wireless communication device101 is used to select the WiFi access systems and password, while communication device102 and/orcommunication device103 are used to access the selected WiFi access systems with the password. Also note that a user may have different passwords for different groups of access systems, devices, timeframes, and the like. If desired, the user may also use a given password for only one access system. Note that a password could be any sequence of letters, numbers, symbols, or other data.
In some examples, additional items are selected by the user responsive to the display data. These additional items may be indicated in the user data, stored in the association, and used in combination to transfer the positive response to the access request. For example, the user may specify a user name to use when accessing their selected WiFi network access systems. In other examples, the user specifies a communication device to use when accessing their selected WiFi network access systems. In yet other examples, the user specifies a timeframe for access to their selected WiFi network access systems.
In some examples,user interface server131 transfers configuration data for delivery touser communication device101 and/or user communication device102 overaccess network110. The configuration data associates broadcast identification signals for the user-selected WiFi network access systems with the user-selected password. User communication devices101-102 use the configuration data to obtain the password from the user and to transfer the access request when in range of one of the selected WiFi network access systems.
In some examples, the configuration data includes an access key that is correlated to the broadcast identification signals for the user-selected WiFi network access systems and with the user-selected password. The access key is stored inauthorization server132 in association with the user-selected WiFi network access systems.User communication device101 would provide the access key in their access request when in range of one of the selected WiFi network access systems and if the password is provided by the user.Authorization server132 could then return a positive response based on its own stored access key.
In some examples, the configuration data indicates a dynamically-changing network key, such as time-of-day, that is correlated to the broadcast identification signals for the user-selected WiFi network access systems and with the user-selected password. When in range of one of the selected WiFi network access systems and if the password is provided by the user,user communication device101 uses the dynamically-changing network key to generate a hash value for their access request. In response to the access request,authorization server132 could generate its own hash value based the dynamically-changing network key for comparison to the hash value from the access request. If the comparison indicates the relationship, thenauthorization server132 returns the positive response for WiFi access. For example, if the dynamically-changing network key is time-of-day, then both hash values should correlate if calculated within the same timeframe.
Access network110 comprises computer and communications equipment that use Wireless Fidelity (WiFi), Long Term Evolution (LTE), Global System for Mobile Communications (GSM), Evolution Data Only (EVDO), Bluetooth, DOCSYS, T1, Ethernet, Internet Protocol (IP), or some other communication protocols—including combinations thereof.Server system130 comprises computer equipment and software that may be implemented in a single platform or may be distributed across multiple platforms. Communication links111-112 and116-117 might be wireless, optical, metallic, or some other communication media—including combinations thereof. Communication links111-112 and116-117 may individually comprise multiple parallel connections that utilize different protocols and paths. Communication links111-112 and116-117 may also include various intermediate networks, systems, and devices.
FIG. 2 illustrates the operation ofcommunication system100 to provide user control over access toWiFi network120.User interface server131 transfers display data touser communication device101 overaccess network110, anduser communication device101 graphically presents the resulting display data to the user. For example, user communication device might present the display data in the form of geographic maps that indicate WiFi access systems121-124 for selection. In response to the display data, the user selects WiFi access systems121-123. The user also specifies a password for user-selected WiFi access systems121-123.
User communication device101 transfers user data overaccess network110 touser interface server131. The user data indicates user-selected WiFi network access systems121-123, the user-selected password, and possibly other user selections and data.User interface server131 transfers the user data touser authorization server132.Authorization server132 stores an association between the user-selected WiFi network access systems121-123 and the user-selected password—and typically other pertinent data. Various techniques to store this association are described herein.
WiFi access system121 transmits a wireless identification signal for reception by in-range devices, such as an SSID signal, pilot signal, and the like. Subsequently,user communication device101 detects the identification signal fromWiFi access system121 and prompts the user for a password. The user provides their selected password touser communication device101, anddevice101 transfers an access request toWiFi access system121 using the user-selected password. Various techniques to use the password are described herein.WiFi access system121 transfers the access request toauthorization server132.
Authorization server132 processes the access request and the stored association between user-selected WiFinetwork access system121 and user-selected password to determine that the request should be granted.Authorization server132 then transfers a positive response to WiFinetwork access system121. Based on the positive response, WiFinetwork access system121 provideswireless communication device101 and the user with WiFi network access to some other data system, such as the Internet (not shown).
FIG. 3 illustrates the operation ofcommunication system100 to provide user control over access toWiFi network120 by allowing user-selection of communication devices.User interface server131 transfers display data touser communication device101 overaccess network110, anduser communication device101 graphically presents the resulting display data to the user. In response to the display data, the user selects WiFi access systems121-123 and a password. In this example, the user also selectscommunication device103 to access user-selected WiFi access systems121-123. The user may specifycommunication device103 by name, address, number, and the like.User interface server131 may also identifycommunication device103 in the display data for selection by the user.
User communication device101 transfers user data overaccess network110 touser interface server131. The user data indicates user-selected WiFi network access systems121-123, user-selectedcommunication device103, the user-selected password, and possibly other information.User interface server131 transfers the user data touser authorization server132.Authorization server132 stores an association between the user-selected WiFi network access systems121-123, user-selectedcommunication device103, the user-selected password, and other data. Various techniques to store this association are described herein.
WiFi access system123 transmits its wireless identification signal.User communication device103 detects the identification signal fromWiFi access system123 and prompts the user for a password. The user provides their selected password touser communication device103, anddevice103 transfers an access request toWiFi access system123 using the user-selected password. Various techniques to use the password are described herein.
WiFi access system123 transfers the access request toauthorization server132.Authorization server132 processes the access request and the stored association between user-selected WiFinetwork access system123, user-selectedcommunication device103, and the user-selected password to determine that the request should be granted.Authorization server132 then transfers a positive response to WiFinetwork access system123. Based on the positive response, WiFinetwork access system123 providesuser communication device103 with WiFi network access to another data system, such as the Internet (not shown). Note that other items could be also selected by the user and used for authorization, such as timeframes, security formats, and the like.
FIG. 4 illustrates the operation ofcommunication system100 to provide user control over access toWiFi network120 by transferring configuration data touser communication device101.User interface server131 transfers display data touser communication device101 overaccess network110, anduser communication device101 graphically presents the resulting display data to the user. In response to the display data, the user selects WiFi access systems121-123 and a password.
User communication device101 transfers user data overaccess network110 touser interface server131. The user data indicates user-selected WiFi network access systems121-123, the user-selected password, and possibly other user selections and data.User interface server131 transfers the user data touser authorization server132.Authorization server132 stores an association between the user-selected WiFi network access systems121-123 and one or more access keys for systems121-123. The stored association may also indicate the user-selected password and other pertinent data.
Responsive to the user-selections,user interface server131 transfers configuration data overaccess network110 touser communication device101. The configuration data indicates identification signals (SSIDs and the like) for user-selected WiFi network access systems121-123. The configuration data also indicates the password, the access key, and perhaps other data. Note thatuser interface server131 may also transfer the configuration data to other user-selected communication devices.
User-selectedWiFi access system121 transmits its wireless identification signal, and eventually,user communication device101 detects this identification signal fromWiFi access system121. Based on the configuration data and the ID signal,user communication device101 prompts the user for a password. The user provides their selected password touser communication device101, anddevice101 transfers an access request toWiFi access system121 using the user-selected password. In this example,user communication device101 uses the password for verification, and if the user-supplied password matches the password from the configuration data, thendevice101 transfers the access key to user-selectedWiFi access system121.
WiFi access system121 transfers the access request including the access key toauthorization server132.Authorization server132 processes the access request and the stored association between user-selected WiFinetwork access system121 and user-supplied access key to determine that the request should be granted.Authorization server132 then transfers a positive response to WiFinetwork access system121. Based on the positive response, WiFinetwork access system121 providesuser communication device101 and the user with WiFi network access to some other data system, such as the Internet (not shown).
FIG. 5 illustrates the operation ofcommunication system100 to provide user control over access toWiFi network120 by using dynamic access keys.User interface server131 transfers display data touser communication device101 overaccess network110, anduser communication device101 graphically presents the resulting display data to the user. In response to the display data, the user selects WiFi access systems121-123, a password, and user communication device102.
User communication device101 transfers user data overaccess network110 touser interface server131. The user data indicates user-selected WiFi network access systems121-123, user communication device102, the user-selected password, and possibly other data.User interface server131 transfers the user data touser authorization server132.Authorization server132 stores an association between the user-selected WiFi network access systems121-123 and a secret code used to generate the dynamic key. The stored association may also indicate the user-selected password and other pertinent data.
Responsive to the user-selections,user interface server131 transfers configuration data overaccess network110 to user communication device102. The configuration data indicates identification signals for user-selected WiFi network access systems121-123. The configuration data also indicates the password, secret code, dynamic key instructions, and perhaps other data. Note thatuser interface server131 may also transfer the configuration data to other user-selected communication devices.
User-selectedWiFi access system122 transmits its wireless identification signal, and eventually, user communication device102 detects this identification signal fromWiFi access system122. Based on the configuration data and the ID signal, user communication device102 prompts the user for a password. The user provides their selected password to user communication device102, and device102 transfers an access request toWiFi access system122 using the user-selected password.
In this example, user communication device102 uses the password for verification, and if the user-supplied password matches the password from the configuration data, then device102 generates and transfers a dynamic access key to user-selectedWiFi access system122. In this example, the dynamic key is a mathematical hash between the secret code from the configuration data and dynamically changing network data. For example, the secret code could be mathematically combined with the current time-of-day to generate the dynamic access key.
WiFi access system122 transfers the access request including the dynamic access key toauthorization server132.Authorization server132 processes the access request and the stored association (the secret code) to generate the dynamic access key in a similar manner to device102. If the two dynamic access keys correlate, then the access request should be granted. Note that the correlation may not require a strict match. For example, if time of day is used for the dynamic key, then two keys generated around the same time would have a detectable mathematical relationship and would correlate. Various other dynamic key techniques could be used in a similar manner.
Authorization server132 then transfers a positive response to WiFinetwork access system122. Based on the positive response, WiFinetwork access system122 provides user communication device102 and the user with WiFi network access to some other data system, such as the Internet (not shown).
FIG. 6 illustratescommunication device display600 that renders a geographic map for a user to select WiFi network access systems601-604 and specify passwords. For clarity, the geographic map is depicted by a simple grid onFIG. 6. Note that navigation controls would be provided on the map, but they are not depicted for clarity. In this example, the user has selected WiFi access systems602-603 as indicated by the frame around systems602-603. Text boxes are associated with the selected WiFi access systems602-603 and provide a mechanism for the user to specify passwords, user names, user devices, security settings, and the like. The text boxes also provide access system information, such as SSIDs, location, and possibly other data.
FIG. 7 illustrates LTE/WiFi communication system700 to provide user control over access toWiFi network720 having geographically-distributed WiFi access systems721-724. LTE/WiFi communication system700 comprises user communication devices701-703,wireless LTE network710,WiFi network720, IP Multimedia Subsystem (IMS)717, andIP networks718.Wireless LTE network710 includeseNodeB711, servinggateway712, Packet Data Network (PDN)gateway713, Mobility Management Entity (MME)714, Home Subscriber Server (HSS)715, and Policy Charging and Rules Function (PCRF)716.
Wireless LTE network710 also includesserver system730 that comprisesuser interface server731 andauthorization server732.User interface server731 andauthorization server732 operate like servers131-132 described above. Note that theauthorization server732 is hosted by or integrated withinHSS715. In a like manner,wireless LTE network710 operates likeaccess network110 described above. Thus,wireless LTE network710 transfers the display data, receives user-selections, transfers configuration data, and provides WiFi authorization as described above.
For example, the user may operate one of communication devices701-703 to accessuser interface server731 and select WiFi access systems721-722 and724, a user name, a password, user devices701-703, timeframes, and the like. When one of the selected user communication devices701-703 is proximate to one of the selected WiFi access systems721-722 and724, then the user device will interact with the proximate WiFi access system as described above. The proximate WiFi access system will transfer access requests toauthorization server732 inHSS715—typically through various proxies and interfaces.Authorization server732 inHSS715 transfers positive responses as described above.
FIG. 8 illustratesWiFi communication system800 to provide user control over access toWiFi network820 having geographically-distributed WiFi access systems821-824.WiFi communication system800 comprises user communication devices801-803,IP access network810,IP networks818, andserver system830.Server system830 resides in the core of a nationwide wireless communication network.
Server system830 comprisesuser interface server831 andauthorization server832.User interface server831 andauthorization server832 and operate like servers131-132 described above. Thus,server system830 transfers the display data, receives user-selections, transfers configuration data, and provides WiFi authorization as described above.
For example, the user may operate one of communication devices801-803 to accessuser interface server831 and select WiFi access systems821-822 and824, a user name, a password, user devices801-803, timeframes, and the like. When one of the selected user communication devices801-803 is proximate to one of the selected WiFi access systems821-822 and824, then the user device will interact with the proximate WiFi access system as described above. The proximate WiFi access system will transfer access requests toauthorization server832.Authorization server832 transfers positive responses as described above.
In other examples, portions of the server systems described herein could be integrated into the authorization systems of other networks. For example, the AAA system in a 2G or 3G network could host the user interface server and/or the authorization servers described herein.
FIG. 9 illustratesserver system900 to provide user control over access to WiFi networks.Server system900 is an example of theserver system130, althoughsystem130 may use alternative configurations and operations.Server system900 comprisescommunication transceivers901 andprocessing system903.Processing system903 comprisesmicro-processing circuitry911 andmemory912.Memory912stores software913.Server system900 may be integrated into a single platform or may be distributed across multiple diverse computer and communication systems. Some conventional aspects ofserver system900 are omitted for clarity, such as power supplies, enclosures, and the like.
Communication transceivers901 comprise communication components, such as ports, circuitry, memory, software, and the like.Communication transceivers901 typically utilize Ethernet, Internet, or some other networking protocol—including combinations thereof.
Micro-processor circuitry911 comprises circuit boards that hold integrated circuitry and associated electronics.Memory912 comprises non-transitory, computer-readable, data storage media, such as flash drives, disc drives, and the like.Software913 comprises computer-readable instructions that control the operation ofmicro-processor circuitry911 when executed.Software913 includes modules921-923 and may also include operating systems, applications, utilities, databases, and the like.Micro-processor circuitry911 andmemory912 may be integrated into a single computer system or may be distributed across multiple computer systems.
When executed bycircuitry911,user module921 directscircuitry911 to interact with user devices to enable the user to select access systems, passwords, and the like.User module921 also directscircuitry911 to transfer configuration data in some examples. When executed bycircuitry911,database module922 directscircuitry911 to stores the associations as described above. When executed bycircuitry911,authorization module923 directscircuitry911 to provide positive or negative responses to WiFi access requests based on the stored associations.
FIG. 10 illustrateswireless communication device1000 to provide user control over access to WiFi networks.Wireless communication device1000 is an example of user communication devices101-103, although devices101-103 may use alternative configurations and operations.Wireless communication device1000 comprisesaccess network transceiver1001,network transceiver1002,processing system1003, anduser interface1004.Processing system1003 comprisesmicro-processing circuitry1011 andmemory1012.Memory1012stores software1013. Some conventional aspects ofwireless communication device1000 are omitted for clarity, such as power supplies, enclosures, and the like.Wireless communication device1000 may be integrated into other systems or devices.
Access network transceiver1001 andWiFi transceiver1002 each comprise communication components, such as circuitry, memory, software, antennas, amplifiers, filters, modulators, signal processors, and the like. In some examples, the radio communications include multiple transceiver sub-systems for near-field, local network, and wide-area network data communications.Access network transceiver1001 exchanges user data and configuration data as described above.WiFi network transceiver1002 detects WiFi identification signals, transfers WiFi access requests, and provides WiFi network access.
User interface1004 includes components to interact with a human operator, such as a touch display, speaker, microphone, camera, buttons, and switches.User interface1004 displays maps, text boxes, user prompts and the like. Typically, a touch display inuser interface1004 receives the user instructions that trigger the actions described herein.
Micro-processor circuitry1011 comprises one or more circuit boards that hold integrated circuit chips and associated electronics.Memory1012 comprises non-transitory data storage media, such as flash drives, disc drives, and the like.Software1013 comprises computer-readable instructions that control the operation ofmicro-processor circuitry1011 when executed.Software1013 includes modules1021-1023 and may also include additional operating systems, applications, utilities, databases, and the like.
When executed bycircuitry1011,display module1021 directscircuitry1011 to display maps, text boxes, and the like to receive user selections. When executed bycircuitry1011, configuration module1022direct circuitry1011 to receive and store configuration data as described herein. When executed bycircuitry1011,WiFi module1023 directscircuitry1011 to prompt for passwords and transfer access requests as described herein.
The above description and associated figures teach the best mode of the invention. The following claims specify the scope of the invention. Note that some aspects of the best mode may not fall within the scope of the invention as specified by the claims. Those skilled in the art will appreciate that the features described above can be combined in various ways to form multiple variations of the invention. As a result, the invention is not limited to the specific embodiments described above, but only by the following claims and their equivalents.

Claims (10)

What is claimed is:
1. A method of operating a wireless communication device to control access to a geographically-distributed Wireless Fidelity (WiFi) network that has multiple WiFi access systems, the method comprising:
graphically presenting WiFi network data comprising a geographic map showing the multiple WiFi access systems wherein responsive to the graphical presentation, a user selects the wireless communication device, a single user-selected network name, a single user-selected password, and only some of the multiple WIFI access systems wherein the user does not select all of the multiple WIFI access systems;
receiving the user selections of the multiple user-selected WiFi access systems, the wireless communication device, the single user-selected network name, and the single user-selected password;
wirelessly receiving at least one access key for the multiple user-selected WiFi access systems;
wirelessly detecting one of the multiple user-selected WiFi access systems and responsively graphically presenting the single user-selected network name and a password prompt to receive the single user-selected password wherein the single user-selected network name and the password prompt are not graphically presented when the unselected WiFi access systems are detected; and
receiving the single user-selected password, and in response, wirelessly transferring the access key and an identifier for the wireless communication device to the detected one of the multiple user-selected WiFi access systems, and in response, wirelessly exchanging user data over the detected one of the multiple user-selected WiFi access systems after the detected one of the user-selected WiFi access systems authorizes the access key and the identifier for the wireless communication device.
2. The method ofclaim 1 further comprising graphically presenting location names for the multiple WiFi access systems on the geographic map.
3. The method ofclaim 1 further comprising graphically presenting Service Set Identifiers (SSIDs) for the multiple WiFi access systems on the geographic map.
4. The method ofclaim 1 further comprising graphically presenting service capabilities for the multiple WiFi access systems on the geographic map.
5. The method ofclaim 1 wherein the wireless communication device has a Long Term Evolution (LTE) communication interface.
6. A wireless communication device to control access to a geographically-distributed Wireless Fidelity (WiFi) network that has multiple WiFi access systems, the wireless communication device comprising:
a User Interface (UI) configured to graphically present WiFi data comprising a geographic map showing the multiple WiFi access systems to responsively receive user selections of the wireless communication device, a single user-selected network name, a single user-selected password, and only some of the multiple WIFI access systems wherein the user does not select all of the multiple WIFI access systems;
a communication interface configured to wirelessly receive at least one access key for the multiple user-selected WiFi access systems and to wirelessly detect the multiple user-selected WiFi access systems; and
a processing system configured, in response to a detection of one of the user-selected WiFi access systems, to direct the UI to graphically present the network name and a password prompt for the single user-selected password, receive the single user-selected password through the UI, and in response to receiving the single user-selected password, direct the communication interface to wirelessly transfer the access key and an identifier for the wireless communication device to the detected one of the user-selected WiFi access systems, and direct the communication interface to wirelessly exchange user data over the detected one of the user-selected WiFi access systems after the detected one of the user-selected WiFi access system authorizes the access key and the identifier for the wireless communication device, wherein the processing system is configured to not graphically present the single user-selected network name and the password prompt when the unselected WiFi access systems are detected.
7. The wireless communication device ofclaim 6 wherein the UI is configured to graphically present location names for the multiple WiFi access systems on the geographic map.
8. The wireless communication device ofclaim 6 wherein the UI is configured to graphically present Service Set Identifiers (SSIDs) for the multiple WiFi access systems on the geographic map.
9. The wireless communication device ofclaim 6 wherein the UI is configured to graphically present service capabilities for the multiple WiFi access systems on the geographic map.
10. The wireless communication device ofclaim 6 wherein the communication interface comprises a Long Term Evolution (LTE) interface.
US15/131,8892012-07-192016-04-18User control over WIFI network accessActiveUS9985938B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/131,889US9985938B2 (en)2012-07-192016-04-18User control over WIFI network access

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US13/552,749US9344452B2 (en)2012-07-192012-07-19User control over WiFi network access
US15/131,889US9985938B2 (en)2012-07-192016-04-18User control over WIFI network access

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US13/552,749ContinuationUS9344452B2 (en)2012-07-192012-07-19User control over WiFi network access

Publications (2)

Publication NumberPublication Date
US20160234179A1 US20160234179A1 (en)2016-08-11
US9985938B2true US9985938B2 (en)2018-05-29

Family

ID=48875786

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US13/552,749ActiveUS9344452B2 (en)2012-07-192012-07-19User control over WiFi network access
US15/131,889ActiveUS9985938B2 (en)2012-07-192016-04-18User control over WIFI network access

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US13/552,749ActiveUS9344452B2 (en)2012-07-192012-07-19User control over WiFi network access

Country Status (4)

CountryLink
US (2)US9344452B2 (en)
EP (1)EP2875663B1 (en)
CA (1)CA2879117C (en)
WO (1)WO2014014880A1 (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8984277B2 (en)*2012-09-282015-03-17Cisco Technology, Inc.Reduced authentication times in constrained computer networks
US9763098B2 (en)2013-01-112017-09-12Apple Inc.Bypassing security authentication scheme on a lost device to return the device to the owner
CN104519020B (en)2013-09-292017-10-13阿里巴巴集团控股有限公司Manage method, server and the system of wireless network login password sharing function
US8943569B1 (en)2013-10-012015-01-27Myth Innovations, Inc.Wireless server access control system and method
US9686692B2 (en)2014-03-202017-06-20Microsoft Technology Licesning, LLCWi-Fi tile transfer
CN105282862B (en)2014-06-172020-07-31南京中兴软件有限责任公司Wireless network access point connection method and terminal
US20160261576A1 (en)*2015-03-052016-09-08M-Files OyMethod, an apparatus, a computer program product and a server for secure access to an information management system
US20160328120A1 (en)*2015-05-042016-11-10Rivada Networks, LlcMethods and System for Dynamic Spectrum Arbitrage with a Graphic Administration Application
US9756505B1 (en)*2015-06-082017-09-05Symantec CorporationSystems and methods for utilizing authentication requests for on-demand provisioning of access-point accounts
US9628992B2 (en)2015-07-312017-04-18Wyfi, Inc.WiFi access management system and methods of operation thereof
US9922225B2 (en)*2015-09-162018-03-20CloudMondo, Inc.Cloud-based authentication of user devices for onboarding to a Wi-Fi network
US10064058B2 (en)*2015-12-082018-08-28Cisco Technology, Inc.Node selection using a combination of subscription entitlement and nodal characteristics
JP2018029220A (en)*2016-08-152018-02-22富士ゼロックス株式会社Wireless network device, image formation apparatus, wireless network system and program
WO2018125703A1 (en)*2016-12-272018-07-05Bandwidthx Inc.Environment signatures
US10194382B2 (en)2016-12-272019-01-29Bandwidthx Inc.Auto-discovery of amenities
WO2018125704A1 (en)2016-12-272018-07-05Bandwidthx Inc.Radio management based on user intervention
CN108282736B (en)*2016-12-302020-11-10腾讯科技(深圳)有限公司Networking method and device of intelligent terminal
CN108696868B (en)*2017-03-012020-06-19西安西电捷通无线网络通信股份有限公司Processing method and device of credential information for network connection
US10820361B2 (en)2017-05-022020-10-27Samsung Electronics Co., Ltd.Method and system for application-controlled multiple Wi-Fi connections
US11689925B2 (en)2017-09-292023-06-27Plume Design, Inc.Controlled guest access to Wi-Fi networks
US11496902B2 (en)2017-09-292022-11-08Plume Design, Inc.Access to Wi-Fi networks via two-step and two-party control
KR102414927B1 (en)*2018-03-212022-06-30삼성전자 주식회사Method and apparatus for authenticating a device using wireless local area network service
CN111726807A (en)*2020-04-222020-09-29深圳市伟文无线通讯技术有限公司Device and method for realizing network access of embedded WIFI module through voice interaction
US11930548B2 (en)2021-06-232024-03-12Microsoft Technology Licensing, LlcEstablishing multiple infrastructure connections to multiple access points via a single wireless network interface controller

Citations (40)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2001041401A2 (en)1999-12-032001-06-07At & T Corp.System and method for encoding user information in domain names
US6614774B1 (en)1998-12-042003-09-02Lucent Technologies Inc.Method and system for providing wireless mobile server and peer-to-peer services with dynamic DNS update
WO2004014024A2 (en)2002-08-022004-02-12Wavelink CorporationManaged roaming for wlans
US20040052238A1 (en)2002-08-302004-03-183Com CorporationMethod and system of transferring session speed and state information between access and home networks
US20040215717A1 (en)2002-11-062004-10-28Nils SeifertMethod for prefetching of structured data between a client device and a server device
US20040230446A1 (en)2003-05-132004-11-18Samsung Electronics Co., Ltd.Method and system of automatically registering domain name
US20050050180A1 (en)2003-04-032005-03-03Samsung Electronics Co., Ltd.Method of automatically determining device's nickname, and method of solving redundant nicknames for devices in network and network system thereof
US20050054343A1 (en)2003-09-052005-03-10Nokia CorporationProviding address information for reaching a wireless terminal
US20050143065A1 (en)2002-11-262005-06-30Pathan Arnavkumar M.Inter subnet roaming system and method
US6944167B1 (en)2000-10-242005-09-13Sprint Communications Company L.P.Method and apparatus for dynamic allocation of private address space based upon domain name service queries
EP1633083A1 (en)2003-06-062006-03-08Huawei Technologies Co., Ltd.A method of user access authorization in the wlan
US20060098610A1 (en)*2004-11-052006-05-11Krister SundbergMethod for providing a mobile station with seamless coverage in a 2G/3G communication network and a WLAN
US20070081496A1 (en)2005-06-102007-04-12Ralf KargeMethod and system for the localization of a mobile WLAN client
US20070091861A1 (en)*2005-10-112007-04-26Parag GuptaTechnique for managing wireless networks
US7224673B1 (en)2002-05-242007-05-29Cisco Technology, Inc.Mobile IP registration message compression
US7313631B1 (en)1999-09-062007-12-25University Of BristolDNS updating in communication network
US20080037498A1 (en)2006-08-102008-02-14Motorola, Inc.Optimized tunneling methods in a network
US7447182B2 (en)2001-04-062008-11-04Nortel Networks LimitedDiscovering an address of a name server
US20090003297A1 (en)2007-06-272009-01-01Futurewei Technologies, Inc.METHOD AND APPARATUS FOR DYNAMIC LMA ASSIGNMENT IN PROXY MOBILE IPv6 PROTOCOL
US20090059874A1 (en)*2005-04-202009-03-05Connect Spot Ltd.Wireless access systems
US7510113B2 (en)2001-06-072009-03-31Fujitsu LimitedBilling system, and device constituting same
US7545762B1 (en)2002-08-202009-06-09Sprint Spectrum L.P.Method and system for network presence notification
US20090198808A1 (en)2008-01-312009-08-06Lucent Technologies Inc.Method and apparatus for providing virtual wi-fi access
US20090199281A1 (en)*2008-01-312009-08-06Lucent Technologies Inc.Method and apparatus for virtual wi-fi service with authentication and accounting control
US7636569B2 (en)2002-06-282009-12-22Nokia CorporationMethod of registering home address of a mobile node with a home agent
US20100002668A1 (en)2003-01-142010-01-07Panasonic CorporationService in wlan inter-working, address management system, and method
US7668174B1 (en)2002-10-172010-02-23Cisco Technology, Inc.Methods and apparatus for home address management at home agent for NAI based mobile nodes
US20100100928A1 (en)2008-10-222010-04-22Gasparini Louis ASecure network computing
US7707310B2 (en)2002-11-202010-04-27Cisco Technology, Inc.Mobile IP registration supporting port identification
EP2200223A1 (en)2007-09-122010-06-23Panasonic CorporationWireless terminal device, wireless connection method, and program
US20100322123A1 (en)2006-08-182010-12-23Wifi Rail, Inc.System and method of authenticating mobile devices
US7958544B2 (en)2006-07-212011-06-07Google Inc.Device authentication
US7962122B2 (en)2003-05-232011-06-14Telefonaktiebolaget Lm Ericsson (Publ)Secure traffic redirection in a mobile communication system
US8059643B1 (en)2009-05-112011-11-15Sprint Communications Company L.P.IPv4 and IPv6 single session on a home agent
US20130089001A1 (en)2011-10-052013-04-11Siddhartha DattaguptaAssociating wi-fi stations with an access point in a multi-access point infrastructure network
US8457594B2 (en)2006-08-252013-06-04Qwest Communications International Inc.Protection against unauthorized wireless access points
US20130152168A1 (en)*2011-12-092013-06-13Verizon Patent And Licensing, Inc.Wireless connection method and device
US20130163442A1 (en)2011-12-212013-06-27Kik Interactive, Inc.Methods and apparatus for initializing a network connection for an output device
US20130283358A1 (en)2012-04-242013-10-24Arun ManroaConvenient wifi network access using unique identifier value
US8614976B1 (en)2010-03-292013-12-24Sprint Spectrum L.P.Method and system for registering a nickname associated with a mobile node

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP2004266568A (en)2003-02-282004-09-24Nec Corp Name resolution server and packet transfer device

Patent Citations (42)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6614774B1 (en)1998-12-042003-09-02Lucent Technologies Inc.Method and system for providing wireless mobile server and peer-to-peer services with dynamic DNS update
US7313631B1 (en)1999-09-062007-12-25University Of BristolDNS updating in communication network
WO2001041401A2 (en)1999-12-032001-06-07At & T Corp.System and method for encoding user information in domain names
US6944167B1 (en)2000-10-242005-09-13Sprint Communications Company L.P.Method and apparatus for dynamic allocation of private address space based upon domain name service queries
US7447182B2 (en)2001-04-062008-11-04Nortel Networks LimitedDiscovering an address of a name server
US7510113B2 (en)2001-06-072009-03-31Fujitsu LimitedBilling system, and device constituting same
US7224673B1 (en)2002-05-242007-05-29Cisco Technology, Inc.Mobile IP registration message compression
US7636569B2 (en)2002-06-282009-12-22Nokia CorporationMethod of registering home address of a mobile node with a home agent
WO2004014024A2 (en)2002-08-022004-02-12Wavelink CorporationManaged roaming for wlans
US7545762B1 (en)2002-08-202009-06-09Sprint Spectrum L.P.Method and system for network presence notification
US20040052238A1 (en)2002-08-302004-03-183Com CorporationMethod and system of transferring session speed and state information between access and home networks
US7218609B2 (en)2002-08-302007-05-15Utstarcom, Inc.Method and system of transferring session speed and state information between access and home networks
US7668174B1 (en)2002-10-172010-02-23Cisco Technology, Inc.Methods and apparatus for home address management at home agent for NAI based mobile nodes
US20040215717A1 (en)2002-11-062004-10-28Nils SeifertMethod for prefetching of structured data between a client device and a server device
US7707310B2 (en)2002-11-202010-04-27Cisco Technology, Inc.Mobile IP registration supporting port identification
US20050143065A1 (en)2002-11-262005-06-30Pathan Arnavkumar M.Inter subnet roaming system and method
US20100002668A1 (en)2003-01-142010-01-07Panasonic CorporationService in wlan inter-working, address management system, and method
US20050050180A1 (en)2003-04-032005-03-03Samsung Electronics Co., Ltd.Method of automatically determining device's nickname, and method of solving redundant nicknames for devices in network and network system thereof
US20040230446A1 (en)2003-05-132004-11-18Samsung Electronics Co., Ltd.Method and system of automatically registering domain name
US7962122B2 (en)2003-05-232011-06-14Telefonaktiebolaget Lm Ericsson (Publ)Secure traffic redirection in a mobile communication system
EP1633083A1 (en)2003-06-062006-03-08Huawei Technologies Co., Ltd.A method of user access authorization in the wlan
US20050054343A1 (en)2003-09-052005-03-10Nokia CorporationProviding address information for reaching a wireless terminal
US20060098610A1 (en)*2004-11-052006-05-11Krister SundbergMethod for providing a mobile station with seamless coverage in a 2G/3G communication network and a WLAN
US20090059874A1 (en)*2005-04-202009-03-05Connect Spot Ltd.Wireless access systems
US20070081496A1 (en)2005-06-102007-04-12Ralf KargeMethod and system for the localization of a mobile WLAN client
US20070091861A1 (en)*2005-10-112007-04-26Parag GuptaTechnique for managing wireless networks
US7958544B2 (en)2006-07-212011-06-07Google Inc.Device authentication
US8068499B2 (en)2006-08-102011-11-29Motorola Solutions, Inc.Optimized tunneling methods in a network
US20080037498A1 (en)2006-08-102008-02-14Motorola, Inc.Optimized tunneling methods in a network
US20100322123A1 (en)2006-08-182010-12-23Wifi Rail, Inc.System and method of authenticating mobile devices
US8457594B2 (en)2006-08-252013-06-04Qwest Communications International Inc.Protection against unauthorized wireless access points
US20090003297A1 (en)2007-06-272009-01-01Futurewei Technologies, Inc.METHOD AND APPARATUS FOR DYNAMIC LMA ASSIGNMENT IN PROXY MOBILE IPv6 PROTOCOL
EP2200223A1 (en)2007-09-122010-06-23Panasonic CorporationWireless terminal device, wireless connection method, and program
US20090198808A1 (en)2008-01-312009-08-06Lucent Technologies Inc.Method and apparatus for providing virtual wi-fi access
US20090199281A1 (en)*2008-01-312009-08-06Lucent Technologies Inc.Method and apparatus for virtual wi-fi service with authentication and accounting control
US20100100928A1 (en)2008-10-222010-04-22Gasparini Louis ASecure network computing
US8059643B1 (en)2009-05-112011-11-15Sprint Communications Company L.P.IPv4 and IPv6 single session on a home agent
US8614976B1 (en)2010-03-292013-12-24Sprint Spectrum L.P.Method and system for registering a nickname associated with a mobile node
US20130089001A1 (en)2011-10-052013-04-11Siddhartha DattaguptaAssociating wi-fi stations with an access point in a multi-access point infrastructure network
US20130152168A1 (en)*2011-12-092013-06-13Verizon Patent And Licensing, Inc.Wireless connection method and device
US20130163442A1 (en)2011-12-212013-06-27Kik Interactive, Inc.Methods and apparatus for initializing a network connection for an output device
US20130283358A1 (en)2012-04-242013-10-24Arun ManroaConvenient wifi network access using unique identifier value

Non-Patent Citations (9)

* Cited by examiner, † Cited by third party
Title
3rd Generation Partnership Project 2, "cdma2000 Wireless IP Network Standard: Simple IP and Mobile IP Access Services," 3GPP2 X.S0011-002-C, Version 1.0.0, Aug. 2003.
Aboba, et al., "The Network Access Identifier," Network Working Group, Request for Comments: 4282, Dec. 2005.
Johnson, et al., "Mobility Support in 1Pv6," Network Working Group, Request for Comments: 3775, Jun. 2004.
Junbiao Zhang, et al.; "Virtual Operator based AAA in Wireless LAN Hot Spots with Ad-hoc Networking Support;" Mobile Computing and Communications Review; Jul. 1, 2002; pp. 10-21; vol. 6, No. 3; New York, NY.
Perkins, "IP Mobility Support for 1Pv4," Network Working Group, Request for Comments: 3344, Aug. 2002.
Rigney, et al., "Remote Authentication Dial in User Service (RADIUS)," Network Working Group, Request for Comments: 2865, Jun. 2000.
U.S. Appl. No. 11/500,706, filed Aug. 8, 2006.
Vixie, et al., "Dynamic Updates in the Domain Name System (DNS Update)," Network Working Group, Request for Comments: 2136, Apr. 1997.
Williamson, et al., "Referral Whois (RWhois) Protocol V1.5," Network Working Group, Request for Comments: 2167, Jun. 1997.

Also Published As

Publication numberPublication date
WO2014014880A1 (en)2014-01-23
CA2879117C (en)2017-04-11
US20160234179A1 (en)2016-08-11
US20140026192A1 (en)2014-01-23
CA2879117A1 (en)2014-01-23
US9344452B2 (en)2016-05-17
EP2875663A1 (en)2015-05-27
EP2875663B1 (en)2018-01-10

Similar Documents

PublicationPublication DateTitle
US9985938B2 (en)User control over WIFI network access
US11973746B2 (en)Connecting IMSI-less devices to the EPC
EP3016419B1 (en)Method of changing profile using identification module and electronic device implementing same
US10887745B2 (en)Method and device for sharing file between different terminals
US9121921B2 (en)Location information collection method and system for dual SIM mobile terminals
US9936390B2 (en)Method and apparatus of triggering applications in a wireless environment
EP3668204B1 (en)Network registration method of internet of things device, and device therefor
US9130919B2 (en)Hosted IMS instance with authentication framework for network-based applications
CN103685176B (en)Terminal equipment, equipment management server and connection establishment method
US20200169867A1 (en)Interception method, core network device and base station
US9047470B2 (en)Secure provisioning of commercial off-the-shelf (COTS) devices
WO2012063558A1 (en)User verification device and user verification method
US10292187B2 (en)Wireless communication apparatus, server, payment apparatus, wireless communication method, and program
KR102025363B1 (en)Portable Terminal
US9560047B1 (en)Multi-device authorization to access wireless network communications based on shared event times
CN106357492A (en)Network access method and device for household appliance and household appliance
JP5819017B1 (en) Communication system and connection method
CN105451304B (en)A kind of information processing method and router

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SPRINT COMMUNICATIONS COMPANY L.P., KANSAS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GATEWOOD, JOHN M.;SCHNITZER, LEE ALAN;WOODRUM, SHARON L.;AND OTHERS;REEL/FRAME:038309/0138

Effective date:20120718

ASAssignment

Owner name:DEUTSCHE BANK TRUST COMPANY AMERICAS, NEW YORK

Free format text:GRANT OF FIRST PRIORITY AND JUNIOR PRIORITY SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:SPRINT COMMUNICATIONS COMPANY L.P.;REEL/FRAME:041895/0210

Effective date:20170203

STCFInformation on status: patent grant

Free format text:PATENTED CASE

ASAssignment

Owner name:SPRINT COMMUNICATIONS COMPANY L.P., KANSAS

Free format text:TERMINATION AND RELEASE OF FIRST PRIORITY AND JUNIOR PRIORITY SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:052969/0475

Effective date:20200401

Owner name:DEUTSCHE BANK TRUST COMPANY AMERICAS, NEW YORK

Free format text:SECURITY AGREEMENT;ASSIGNORS:T-MOBILE USA, INC.;ISBV LLC;T-MOBILE CENTRAL LLC;AND OTHERS;REEL/FRAME:053182/0001

Effective date:20200401

ASAssignment

Owner name:T-MOBILE INNOVATIONS LLC, KANSAS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SPRINT COMMUNICATIONS COMPANY L.P.;REEL/FRAME:055604/0001

Effective date:20210303

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:4

ASAssignment

Owner name:SPRINT SPECTRUM LLC, KANSAS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001

Effective date:20220822

Owner name:SPRINT INTERNATIONAL INCORPORATED, KANSAS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001

Effective date:20220822

Owner name:SPRINT COMMUNICATIONS COMPANY L.P., KANSAS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001

Effective date:20220822

Owner name:SPRINTCOM LLC, KANSAS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001

Effective date:20220822

Owner name:CLEARWIRE IP HOLDINGS LLC, KANSAS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001

Effective date:20220822

Owner name:CLEARWIRE COMMUNICATIONS LLC, KANSAS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001

Effective date:20220822

Owner name:BOOST WORLDWIDE, LLC, KANSAS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001

Effective date:20220822

Owner name:ASSURANCE WIRELESS USA, L.P., KANSAS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001

Effective date:20220822

Owner name:T-MOBILE USA, INC., WASHINGTON

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001

Effective date:20220822

Owner name:T-MOBILE CENTRAL LLC, WASHINGTON

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001

Effective date:20220822

Owner name:PUSHSPRING, LLC, WASHINGTON

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001

Effective date:20220822

Owner name:LAYER3 TV, LLC, WASHINGTON

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001

Effective date:20220822

Owner name:IBSV LLC, WASHINGTON

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001

Effective date:20220822


[8]ページ先頭

©2009-2025 Movatter.jp